Tripwire Partners
Around the globe we have partners of all types that extend the value of your Tripwire investment. Fortra's channel partner programs support your unique cybersecurity needs. So whether it’s a trusted, local reseller or a specific product integration you need, let our extended network of experts help.
...
Blog
Everything You Need to Know About CI/CD and Security
By Anastasios Arampatzis on Tue, 08/30/2022
CI/CD is a recommended technique for DevOps teams and a best practice in agile methodology. CI/CD is a method for consistently delivering apps to clients by automating the app development phases. Continuous integration, continuous delivery, and continuous deployment are the key concepts.
CI/CD adds continuous automation and monitoring throughout...
Tripwire Patents
Representative Marks/Products
Representative Product (s)
Representative U.S. Patents
Tripwire® Enterprise
7,316,016
7,620,715
7,765,460
7,822,724
8,176,158
8,600,996
8,819,491
8,862,941
8,875,129
8,914,341
8,996,684
9,026,646
9,209,996
9,256,841
9,304,850
9,509,554...
Fortra's Tripwire
Tripwire is the trusted leader for establishing a strong cybersecurity foundation. For more than 20 years, we’ve protected the world’s leading organizations against the most damaging cyberattacks, keeping pace with rapidly changing tech complexities.
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 22, 2022
By Andrew Swoboda on Mon, 08/29/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 22nd, 2022, including some commentary of mine.
VMware fixed a privilege escalation issue in VMware Tools
VMware...
Blog
Key Points from the IBM Cost of a Data Breach Report 2022
By Tripwire Guest Authors on Sun, 08/28/2022
The volume and impact of data breaches have accelerated largely in 2022, which has contributed to many adverse effects for businesses. Tc highlights several updated factors that have generated great costs across 17 countries and regions, and 17 industries. The report has included new related areas of analysis such as:
Extended Detection and...
Blog
How to Prevent High Risk Authentication Coercion Vulnerabilities
By Tripwire Guest Authors on Sun, 08/28/2022
Most of us already know the basic principle of authentication, which, in its simplest form, helps us to identify and verify a user, process, or account. In an Active Directory environment, this is commonly done through the use of an NTLM hash. When a user wants to access a network resource, such as a file share, their password is hashed and sent...
Blog
LastPass attackers steal source code, no evidence users' passwords compromised
By Graham Cluley on Fri, 08/26/2022
LastPass, the popular password manager used by millions of people around the world, has announced that it suffered a security breach two weeks ago that saw attackers break into its systems and steal information.
But don't panic just yet - that doesn't mean that all of your passwords are now in the hands of internet criminals. Although the breach is...
Blog
Why Does Medical Imaging Equipment Need Better Cybersecurity?
By Tripwire Guest Authors on Wed, 08/24/2022
Medical imaging cybersecurity needs to evolve to meet today’s security threats. Cyberthreats specifically targeting health care institutions have increased over recent years. More data is also at risk since patients have begun widely using telemedicine services. In addition to the risk of information theft, there is a very serious risk to patients,...
Blog
Top tips for securing board-level buy-in for cybersecurity awareness campaigns
By Tripwire Guest Authors on Wed, 08/24/2022
With Cyber Security Awareness month fast approaching, information security professionals and data protection managers will be looking at how to secure board-level buy-in for company-wide cybersecurity awareness campaigns. Often, this is the biggest hurdle for any cyber awareness campaign as senior leadership weighs the costs and benefits of...
Blog
Privacy in Q2 2022: US, Canada, and the UK
By Tripwire Guest Authors on Tue, 08/23/2022
The second quarter of 2022 offered plenty of positing on privacy, both in the U.S. and internationally. In the U.S., we saw the addition of another state privacy law, and a spark of hope in privacy professionals’ eyes with the introduction of tangible federal legislation. Plus, the Federal Trade Commission (FTC) is positioned to act on rulemaking...
Blog
5 Things We Learned from The Definitive Guide to Data Loss Prevention (DLP)
By Tripwire Guest Authors on Tue, 08/23/2022
In the context of hybrid work, the threat of data loss is rampant. Cybersecurity systems that were once designed to operate within the confines of a network perimeter have become obsolete, with employees using various devices, networks, and applications to get their work done. As such, it’s easier than ever for companies to be vulnerable to the loss...
Blog
Black Hat USA 2022: Key Highlights
By Steve Cumings on Mon, 08/22/2022
Arriving at the keynote hall for Black Hat 2022, I was immediately struck by the size of the crowd - after the seemingly endless pandemic hiatus, the cyber industry had come out in force. The mood was one of enthusiasm, and the entire place reverberated with the vibrancy of reunion. It was a great event for the industry - and for Fortra - and a few...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 15, 2022
By Andrew Swoboda on Mon, 08/22/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 15th, 2022. I’ve also included some comments on these stories.
Newly Uncovered PyPI Package Drops Fileless...
Blog
Email and cybersecurity: Fraudsters are knocking
By Tripwire Guest Authors on Sun, 08/21/2022
Can you remember your first email? Either sending one, or receiving it? I certainly remember explaining to people what email was, and I also remember someone telling me they could live without their email server for "about a month before it becomes a problem".
Can you imagine that now? A month without email?
Emails are a necessary evil
According...
Blog
The State of Security: SIEM in 2022
By Adam Parlett on Wed, 08/17/2022
The world of enterprise cybersecurity is exceedingly dynamic. In a landscape that is ever-changing, security professionals need to combat a class of evolving threat actors by deploying increasingly sophisticated tools and techniques. Today with enterprises operating in an environment that is more challenging than ever, Security Information and Event...